18%
30.07.2014
=> SOCK_STREAM)
or die "Couldn't connect to $remote_host:$remote_port: $@ \n";
while() {
my @lavg = Sys::CpuLoad::load();
my $ts=time();
print $socket "system.loadavg_1min $lavg[0] $ts\n";
print
18%
07.04.2022
security misconfigurations. I'll showcase how it would be possible for an attacker to use those IAM misconfigurations and create serious hassles.
Big Deal?
AWS IAM [3] lets you manage access to AWS
18%
06.05.2014
-oriented midcaps can choose from a wide range of Hadoop services. Amazon offers Elastic MapReduce (EMR), an implementation of Hadoop with support for Hadoop 2.2 and HBase 0.94.7, as well as the MapR M7, M5, and M3
18%
11.02.2016
shows a complete inventory definition that creates the backend host described in Listing 2.
Listing 3
Ansible Inventory
01 [backend]
02 192.168.0.1 # Backend-Server
Ansible is also
18%
10.06.2015
. The current version is Mesos 0.21.
Two years after the first release, the developers presented a far more advanced variant [3] at a 2011 Usenix conference. Twitter engineers had already been running Mesos
18%
07.06.2019
something like:
/usr/lib/python2.7/dist-packages/ requests/__init__.py:80:
RequestsDependencyWarning: urllib3 (1.24.1) or chardet (3.0.4) doesn't match a supported version! Requests
18%
09.04.2019
.
Figure 1: Ncurses-based menuconfig (Wikipedia, CC BY-SA 3.0).
Another option is Newt [22], a programming library that focuses on color TUIs (Figure 2) and uses a widget approach, making programming
18%
05.12.2016
the filter rule
152 eval FOUND_IPS=\`${RULE}\`
153 IPS="${IPS}
154 ${FOUND_IPS}"
155 done
156
157 # Filter by IP address, incidence count, and use of the IP threshold
158 IPS=`echo "${IPS}" | grep -E '([0-9]{1,3}\.){3}[0-9]{1,3
18%
05.12.2019
, the Python module is secretcode.
Listing 4
Testing the Code
$ python3
Python 3.7.3 (default, Mar 27 2019, 22:11:17)
[GCC 7.3.0] :: Anaconda, Inc. on linux
Type "help", "copyright", "credits
18%
05.02.2019
.
The default port is TCP 5900 for TightVNC, so you won't need to adjust the port, just connect to ZAP's internal IP address with the command:
$ xtightvncviewer 172.17.0.3
You can easily get the IP address